SlideShare a Scribd company logo
Attribute-Based Storage Supporting SecureDeduplication of Encrypted Data
in Cloud
Abstract
Attribute-based encryption (ABE) has been widely used in cloud computing where
a data provider outsources his/herencrypted data to a cloud service provider, and
can share the data with users possessing specific credentials (or attributes).
However,the standard ABE system does not support secure de-duplication, which
is crucial for eliminating duplicate copies of identical data inorder to save storage
space and network bandwidth. In this paper, we present an attribute-based storage
system with securede-duplication in a hybrid cloud setting, where a private cloud is
responsible for duplicate detection and a public cloud manages thestorage.
Compared with the prior data de-duplication systems, our system has two
advantages. Firstly, it can be used to confidentiallyshare data with users by
specifying access policies rather than sharing decryption keys. Secondly, it
achieves the standard notion ofsemantic security for data confidentiality while
existing systems only achieve it by defining a weaker security notion. In addition,
we putforth a methodology to modify a ciphertext over one access policy into
ciphertexts of the same plaintext but under other access policieswithout revealing
the underlying plaintext.
Existing System:
In existing system a data provider Bob intends toupload a file M to the cloud, and
share M (file data) with users havingcertain credentials. In order to do so, Bob
encrypts M underan access policy A over a set of attributes, and uploadsthe
corresponding ciphertext to the cloud, such that onlyusers whose sets of attributes
satisfying the access policycan decrypt the ciphertext. Later, another data provider
Alice, uploads a ciphertext for the same underlying file Mbut ascribed to a
different access policy A0. Since the fileis uploaded in an encrypted form, the
cloud is not able todiscern that the plaintext corresponding to Alice’s ciphertextis
the same as that corresponding to Bob’s, and will storeM twice. Obviously, such
duplicated storage wastes storage space and communication bandwidth.
Proposed System:
In this paper, we present an attribute-based storage systemwhich employs
ciphertext-policy attribute-based encryption(CP-ABE) and supports secure
deduplication. In the proposed attributed-based system,the same file could be
encrypted to different ciphertextsassociated with different access policies, storing
only oneciphertext of the file means that users whose attributessatisfy the access
policy of a discarded ciphertext (but notthat of the stored ciphertext) will be denied
to access thedata that they are entitled to. To overcome this problem,we equip the
private cloud with another capability namedciphertext regeneration. For a
ciphertext c of a plaintext Mwith access policy A, the private cloud will be
provided witha trapdoor key which is generated along with the ciphertextc by a
data provider. The private cloud can use the trapdoorkey to convert the ciphertext c
with access policy A to anew ciphertext C with another access policy A0 without
knowing the underlying message M. Thus, if two dataproviders happen to upload
two ciphertexts correspondingto the same file but under different access policies A
andA0, the private cloud can regenerate a ciphertext for thesame underlying file
with an access policy A UA0 usingthe corresponding trapdoor key and then store
the newciphertext instead of the old one in the public cloud.
System Architecture:
Fig.1: System architecture of attribute-based storage withsecure deduplication.
Modules:
Data Provider:
A data provider wants to outsource his/her datato the cloud and share it with users
possessing certaincredentials.
Attribute Authority (AA):
In this system Attribute Authority can generate first Public Key PK and Master
Key MK as well The authority executes the algorithm which inputs a set of
attributes S(S ⊆ A˜) and creates a Secret Key SK and these keys can be send to
authorized User‘s.
Cloud:
The cloud consists of a public cloud which is in charge of data storage and a
private cloud which performs certain computation suchas tag checking.
User:
At the user side, each user can download an item, anddecrypt the ciphertext with
the attribute-based private keygenerated by the AA if this user’s attribute set
satisfies theaccess structure. Each user checks the correctness of thedecrypted
message using the label, and accepts the messageif it is consistent with the label.
SYSTEM CONFIGURATION:
Hardware requirements:
Processer : Any Update Processer
Ram : Min 1 GB
Hard Disk : Min 100 GB
Software requirements:
Operating System : Windows family
Technology : Java (1.7/1.8)
Front-End Technologies : Html, Html-5, JavaScript, CSS.
Web Server : Tomcat 7/8
Database (Back – End) : My SQL5.5
IDE : EditPlus
Implemented by
Development team : Cloud Technologies
Website : http://www.cloudstechnologies.in/
Contact : 8121953811, 040-65511811

More Related Content

DOCX
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
PDF
Psdot 12 a secure erasure code-based cloud storage
DOCX
Privacy preserving delegated access control in public clouds
DOCX
Privacy preserving delegated access control in public clouds
PPT
DOCX
Privacy preserving delegated access control in public clouds
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Psdot 12 a secure erasure code-based cloud storage
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
Key aggregate searchable encryption (kase) for group data sharing via cloud s...

What's hot (16)

PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
DOCX
Audit free cloud storage via deniable attribute based encryption
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
PDF
Audit free cloud storage via deniable attribute-based encryption
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
DOCX
2.achieving practical symmetric searchable encryption with search pattern pri...
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
DOCX
Searchable Symmetric Encryption with Forward Search Privacy
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PPTX
Final 1st
DOC
IEEE paper 2014 abstract
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Audit free cloud storage via deniable attribute based encryption
Privacy preserving multi-keyword ranked search over encrypted cloud data
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
privacy preserving multi keyword ranked search over encrypted cloud data
Audit free cloud storage via deniable attribute-based encryption
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
2.achieving practical symmetric searchable encryption with search pattern pri...
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Searchable Symmetric Encryption with Forward Search Privacy
Privacy preserving multi-keyword ranked search over encrypted cloud data
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Final 1st
IEEE paper 2014 abstract
Ad

Similar to M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud (20)

PPTX
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
PDF
IRJET- Adaptable Wildcard Searchable Encryption System
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PPTX
Attribute based encryption in cloud with significant reduction reviw2
PDF
C04932125
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
PDF
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
DOCX
Audit free cloud storage via deniable attribute based encryption
PDF
IRJET - A Secure Access Policies based on Data Deduplication System
PDF
Attribute Based Encryption with Attribute Hiding in Cloud Storage
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
PDF
IRJET- Attribute based Access Control for Cloud Data Storage
PDF
IRJET- Securing Cloud Data Under Key Exposure
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Secure Cloud Data Using Attribute Based Encryption
Attribute based encryption in cloud with significant reduction reviw2
C04932125
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
Final_attribute based encryption in cloud with significant reduction of compu...
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Audit free cloud storage via deniable attribute based encryption
IRJET - A Secure Access Policies based on Data Deduplication System
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Securing Cloud Data Under Key Exposure
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
Ad

More from CloudTechnologies (20)

DOCX
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
DOCX
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
DOCX
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
DOCX
Machine Learning Classification to predict water purity based on Viruses and ...
DOCX
iot based safety and health monitoring for construction workers
DOCX
Intelligent neonatal monitoring system based on android application using mul...
DOCX
An iot based smart garden with weather station system
DOCX
A deep learning facial expression recognition based scoring system for restau...
DOCX
Diabetes prediction using different machine learning approaches
DOCX
machine learning based predictive analytics of student academic performance i...
DOCX
Image based estimation of real food size for accurate food calorie estimation
DOCX
Network intrusion detection using supervised machine learning technique with ...
DOCX
Io t projects
DOCX
Cloud computing projects
DOCX
Data mining projects
DOCX
Python IEEE 2019 Projects List
DOCX
Machine learning projects
DOCX
Raspberry Pi based voice-operated personal assistant (Neobot)
DOCX
Automation in Agriculture and IoT
DOCX
Gas Leakage Detection Based on IOT
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
Machine Learning Classification to predict water purity based on Viruses and ...
iot based safety and health monitoring for construction workers
Intelligent neonatal monitoring system based on android application using mul...
An iot based smart garden with weather station system
A deep learning facial expression recognition based scoring system for restau...
Diabetes prediction using different machine learning approaches
machine learning based predictive analytics of student academic performance i...
Image based estimation of real food size for accurate food calorie estimation
Network intrusion detection using supervised machine learning technique with ...
Io t projects
Cloud computing projects
Data mining projects
Python IEEE 2019 Projects List
Machine learning projects
Raspberry Pi based voice-operated personal assistant (Neobot)
Automation in Agriculture and IoT
Gas Leakage Detection Based on IOT

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
01-Introduction-to-Information-Management.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Types and Its function , kingdom of life
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Classroom Observation Tools for Teachers
PDF
Sports Quiz easy sports quiz sports quiz
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
01-Introduction-to-Information-Management.pdf
RMMM.pdf make it easy to upload and study
Cell Types and Its function , kingdom of life
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Institutional Correction lecture only . . .
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
GDM (1) (1).pptx small presentation for students
Classroom Observation Tools for Teachers
Sports Quiz easy sports quiz sports quiz
VCE English Exam - Section C Student Revision Booklet
O7-L3 Supply Chain Operations - ICLT Program
master seminar digital applications in india

M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

  • 1. Attribute-Based Storage Supporting SecureDeduplication of Encrypted Data in Cloud Abstract Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/herencrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However,the standard ABE system does not support secure de-duplication, which is crucial for eliminating duplicate copies of identical data inorder to save storage space and network bandwidth. In this paper, we present an attribute-based storage system with securede-duplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages thestorage. Compared with the prior data de-duplication systems, our system has two advantages. Firstly, it can be used to confidentiallyshare data with users by specifying access policies rather than sharing decryption keys. Secondly, it achieves the standard notion ofsemantic security for data confidentiality while existing systems only achieve it by defining a weaker security notion. In addition, we putforth a methodology to modify a ciphertext over one access policy into ciphertexts of the same plaintext but under other access policieswithout revealing the underlying plaintext. Existing System: In existing system a data provider Bob intends toupload a file M to the cloud, and share M (file data) with users havingcertain credentials. In order to do so, Bob encrypts M underan access policy A over a set of attributes, and uploadsthe corresponding ciphertext to the cloud, such that onlyusers whose sets of attributes satisfying the access policycan decrypt the ciphertext. Later, another data provider Alice, uploads a ciphertext for the same underlying file Mbut ascribed to a
  • 2. different access policy A0. Since the fileis uploaded in an encrypted form, the cloud is not able todiscern that the plaintext corresponding to Alice’s ciphertextis the same as that corresponding to Bob’s, and will storeM twice. Obviously, such duplicated storage wastes storage space and communication bandwidth. Proposed System: In this paper, we present an attribute-based storage systemwhich employs ciphertext-policy attribute-based encryption(CP-ABE) and supports secure deduplication. In the proposed attributed-based system,the same file could be encrypted to different ciphertextsassociated with different access policies, storing only oneciphertext of the file means that users whose attributessatisfy the access policy of a discarded ciphertext (but notthat of the stored ciphertext) will be denied to access thedata that they are entitled to. To overcome this problem,we equip the private cloud with another capability namedciphertext regeneration. For a ciphertext c of a plaintext Mwith access policy A, the private cloud will be provided witha trapdoor key which is generated along with the ciphertextc by a data provider. The private cloud can use the trapdoorkey to convert the ciphertext c with access policy A to anew ciphertext C with another access policy A0 without knowing the underlying message M. Thus, if two dataproviders happen to upload two ciphertexts correspondingto the same file but under different access policies A andA0, the private cloud can regenerate a ciphertext for thesame underlying file with an access policy A UA0 usingthe corresponding trapdoor key and then store the newciphertext instead of the old one in the public cloud.
  • 3. System Architecture: Fig.1: System architecture of attribute-based storage withsecure deduplication. Modules: Data Provider: A data provider wants to outsource his/her datato the cloud and share it with users possessing certaincredentials. Attribute Authority (AA): In this system Attribute Authority can generate first Public Key PK and Master Key MK as well The authority executes the algorithm which inputs a set of attributes S(S ⊆ A˜) and creates a Secret Key SK and these keys can be send to authorized User‘s. Cloud: The cloud consists of a public cloud which is in charge of data storage and a private cloud which performs certain computation suchas tag checking.
  • 4. User: At the user side, each user can download an item, anddecrypt the ciphertext with the attribute-based private keygenerated by the AA if this user’s attribute set satisfies theaccess structure. Each user checks the correctness of thedecrypted message using the label, and accepts the messageif it is consistent with the label. SYSTEM CONFIGURATION: Hardware requirements: Processer : Any Update Processer Ram : Min 1 GB Hard Disk : Min 100 GB Software requirements: Operating System : Windows family Technology : Java (1.7/1.8) Front-End Technologies : Html, Html-5, JavaScript, CSS. Web Server : Tomcat 7/8 Database (Back – End) : My SQL5.5 IDE : EditPlus Implemented by Development team : Cloud Technologies Website : http://www.cloudstechnologies.in/ Contact : 8121953811, 040-65511811